diff --git a/.changes/secp256k1.md b/.changes/2.0.md similarity index 52% rename from .changes/secp256k1.md rename to .changes/2.0.md index 09247b2f2..79903cba2 100644 --- a/.changes/secp256k1.md +++ b/.changes/2.0.md @@ -4,5 +4,4 @@ "stronghold-runtime": major --- -Secp256k1 ECDSA + SLIP-10 support added. -Bump `iota-crypto` version to 0.21.2. +Stable release of 2.0. \ No newline at end of file diff --git a/.changes/bump-crypto-0.22.1.md b/.changes/bump-crypto-0.22.1.md deleted file mode 100644 index 240ebe0ca..000000000 --- a/.changes/bump-crypto-0.22.1.md +++ /dev/null @@ -1,8 +0,0 @@ ---- -"iota-stronghold": patch -"stronghold-engine": patch -"stronghold-runtime": patch ---- - -Added support for Secp256k1 ECDSA with SHA256/Keccak256 variants. -Bump `iota-crypto` version to 0.22.1. diff --git a/.changes/bump-crypto-0.23.md b/.changes/bump-crypto-0.23.md deleted file mode 100644 index 8280b9456..000000000 --- a/.changes/bump-crypto-0.23.md +++ /dev/null @@ -1,7 +0,0 @@ ---- -"iota-stronghold": patch -"stronghold-engine": patch -"stronghold-runtime": patch ---- - -Bump `iota-crypto` version to 0.23. diff --git a/.changes/pre.json b/.changes/pre.json deleted file mode 100644 index b7446a9aa..000000000 --- a/.changes/pre.json +++ /dev/null @@ -1,10 +0,0 @@ -{ - "tag": "rc", - "changes": [ - ".changes/bump-crypto-0.22.1.md", - ".changes/bump-crypto-0.23.md", - ".changes/secp256k1.md", - ".changes/snapshot-migration-v3age-zeroize.md", - ".changes/snapshot_encrypt_work_factor.md" - ] -} diff --git a/.changes/snapshot-migration-v3age-zeroize.md b/.changes/snapshot-migration-v3age-zeroize.md deleted file mode 100644 index d47cb35b3..000000000 --- a/.changes/snapshot-migration-v3age-zeroize.md +++ /dev/null @@ -1,11 +0,0 @@ ---- - -"iota-stronghold": minor -"stronghold-engine" : minor -"stronghold-runtime" : minor - ---- - -Upgraded snapshot format to age-encryption.org/v1 with password-based recipient stanza. This resolves the issue with the previous snapshot format encryption being insecure if used with weak passwords. Snapshot encryption doesn't use associated data. -Added sensitive data zeroization which would otherwise leak in stack and heap memory in plaintext after use. -`KeyProvider` unsafe constructors `with_passphrase_truncated`, `with_passphrase_hashed_argon2` were removed, `with_passphrase_hashed` constructor should be used instead. diff --git a/.changes/snapshot_encrypt_work_factor.md b/.changes/snapshot_encrypt_work_factor.md deleted file mode 100644 index 15ab1442d..000000000 --- a/.changes/snapshot_encrypt_work_factor.md +++ /dev/null @@ -1,5 +0,0 @@ ---- -"stronghold-engine": patch ---- - -Added snapshot encryption work factor public access. It should only be used in tests to decrease snapshot encryption/decryption times. It must not be used in production as low values of work factor might lead to secrets/seeds leakage.